Experts say cybercriminals are using a popular online repository called Pastebin to act as a remote server for hosting malware aimed at WordPress users.
Intel and two other vendors have reportedly patched a firmware vulnerability that can affect some Unified Extensible Firmware Interface (UEFI) systems.
Having a responsible disclosure policy is the best way to communicate software vulnerabilities to the public. However, is this doing more harm than good?
With major security events happening in 2014, including Heartbleed and Sony's hack, what can companies do to plan ahead and protect themselves from hacks.
More than 100,000 WordPress-hosted websites appear to be infected with malware that redirects users to the SoakSoak.ru malicious website.
With cyber attacks on the rise, what can businesses do to protect their crown jewels or assets from being breached?
Many major websites are still vulnerable to the POODLE attack, which now works against certain Transport Layer Security (TLS) implementations.
Holes in Google App Engine could allow third parties to access or steal information from the company's cloud-based service for hosting Web apps.
Here is a look at the remote code execution bug in OpenSSL's DTLS, how it works and the different ways cybercriminals might leverage it for exploitation.
IBM X-Force has found a social login attack that lets attackers intrude in many websites' local accounts and has alerted those affected by it.